Pwned by the Mail Carrier

Pwned by the Mail Carrier

How MS Exchange on-premises compromises Active Directory and what organizations can do to prevent that.At SpecterOps, we recommend our customers establish a security boundary around their most critical assets (i.e., Tier Zero) of ...
Microsoft Entra ID: The Complete Guide to Conditional Access Policies

Microsoft Entra ID: The Complete Guide to Conditional Access Policies

Here it is – everything you need to know about using Entra ID’s Conditional Access policies to boost your identity security posture. Microsoft Entra ID (formerly Azure Active Directory) is Microsoft’s cloud-based ...

10 Takeaways from the 2024 Gartner IAM Summit UK  

I had the privilege of attending the Gartner IAM Summit in London. The conference focused on one of the most critical aspects of our digital world: identity-first security. After having some time to ...
A Faster Path to Memory Safety: CHERI, Memory Tagging, and Control Flow Integrity

A Faster Path to Memory Safety: CHERI, Memory Tagging, and Control Flow Integrity

| | Blog, research
Recently, the White House published a technical paper asking organizations to develop roadmaps for implementing memory safety in their software applications. The goal is to eliminate a broad class of software defects ...
Tax Season Phishing Surge: Cyber Exploits with AsyncRAT 

Tax Season Phishing Surge: Cyber Exploits with AsyncRAT 

| | Blog, research
Rise of AsyncRAT: Navigating Tax-Themed Cyber Threats and WinRAR Vulnerabilities  In the last few days, we have seen a rise of cyber attacks conducted by AsyncRAT focusing on ‘TAX attacks context.’ AsyncRAT is ...
Don’t Play with Fire: Prioritize Zyxel Firewall Update to Fix Unreported Vulnerability

Don’t Play with Fire: Prioritize Zyxel Firewall Update to Fix Unreported Vulnerability

| | Blog, research
Our analysis has identified multiple vulnerabilities affecting Zyxel’s USG line of firewalls and VPN appliances running firmware versions 5.36 and below. The vulnerabilities can allow an unauthenticated attacker to force the admin ...
😉

A Guide to the Gartner IAM Summit in London

Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of Gartner’s ...
😉

A Guide to the Gartner IAM Summit in London

Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of Gartner’s ...

How ITDR Could Have Helped Microsoft in the Midnight Blizzard Hack

Identity-based attacks are on the rise, but they can be prevented with the right identity threat detection and response (ITDR) measures.  As winter crept in last year, so did identity threat actors ...
ADCS ESC13 Abuse Technique

ADCS ESC13 Abuse Technique

It is possible to configure an Active Directory Certificate Services (ADCS) certificate template with an issuance policy having an OID group link to a given AD group. This configuration makes AD treat ...